44CON

@44CON

UK's best combined Information Security Conference and training event. DM's not monitored. Newsletter out every Tuesday:

London, UK
Vrijeme pridruživanja: ožujak 2011.

Tweetovi

Blokirali ste korisnika/cu @44CON

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @44CON

  1. prije 7 sati

    Exploring the iOS screen frame-buffer– a kernel reversing experiment

    Poništi
  2. prije 9 sati

    Avocent IP KVMs hacking - or how I got cables from any vendor to work on my Dell 1082DS (x-post from /r/homelab)

    Poništi
  3. prije 10 sati

    AMSI (Antimalware Scripting Interface) bypass by patching memory seen in the wild

    Poništi
  4. prije 12 sati

    Google introduces OpenSk, an Open Source security key implementation

    Poništi
  5. prije 15 sati

    Get all the latest training and info in one weekly email. Next issue out tomorrow

    Poništi
  6. prije 15 sati

    Exploit PoC: HyperV Admin to System

    Poništi
  7. prije 18 sati

    emotet_protection_tools: This repository provides tools to fight against Emotet malware. You can protect your system using these tools

    Poništi
  8. 2. velj

    Kraken Identifies Critical Flaw in Trezor Hardware Wallets

    Poništi
  9. 2. velj

    I’ve been developing Kali i3-gaps’ ISO since November and I finally made it fully functional. If you want to give it a try, check it out over at my Gitlab.

    Poništi
  10. 2. velj

    Hardware Debugging for Reverse Engineers Part 1: SWD, OpenOCD and Xbox One Controllers

    Poništi
  11. 2. velj

    Detection Engineering using Apple’s Endpoint Security Framework

    Poništi
  12. 2. velj

    "How to set up Secure LDAP for Active Directory — Astrix"

    Poništi
  13. 2. velj

    Samesite by Default and What It Means for Bug Bounty Hunters

    Poništi
  14. 1. velj

    OK Google: bypass the authentication!

    Poništi
  15. 1. velj
    Poništi
  16. 1. velj

    Scripting Macs With Malice | How Shlayer and Other Malware Installers Infect macOS | SentinelOne

    Poništi
  17. 1. velj

    Azure Sentinel webinar: Threat Hunting (part 2)

    Poništi
  18. 1. velj

    An attacker logged into the honeypot and ran a batch file that created a vbs script that attempted to download a possible coin miner. The attacker then downloaded an application named Defender Control to turn off Defender. See the timeline, details, and…

    Poništi
  19. 1. velj

    Remote Cloud Execution – Critical Vulnerabilities in Azure Cloud Infrastructure

    Poništi
  20. 1. velj

    A common and dangerous Nessus configuration

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·